A Universally Composable Key Exchange Protocol for Advanced Metering Infrastructure in the Energy Internet

被引:16
作者
Sani, Abubakar Sadiq [1 ]
Yuan, Dong [2 ]
Bao, Wei [2 ]
Dong, Zhao Yang [1 ]
机构
[1] Univ New South Wales, Sch Elect Engn & Telecommun, Sydney, NSW 2052, Australia
[2] Univ Sydney, Fac Engn, Sydney, NSW 2006, Australia
关键词
Protocols; Smart grids; Access control; Cryptography; Authentication; Advanced metering infrastructure (AMI); Energy Internet; key exchange; security; universal composability; MANAGEMENT; FRAMEWORK; SECURITY;
D O I
10.1109/TII.2020.2971707
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The increasing adoption of multiway communications in the advanced metering infrastructure (AMI) of the energy Internet, which is known as the Internet-based smart grid, raises a new question about the security of customers sensitive data and how the data can be protected from growing cyber attacks such as side-channel and false data injection attacks. The dynamic nature of remote connect/disconnect of components in the AMI also brings new types of security threats. To achieve secure multiway communications and remote connect/disconnect of components, the AMI requires a key exchange protocol (KEP) that meets a number of its security requirements such as confidentiality, integrity, availability, identification, authentication, and access control. In this context, in this article we present a KEP that uses an ideal crypto functionality and an ideal AMI key exchange functionality based on universal composability, which allows modular design and analysis of cryptographic protocols. The former functionality enables AMI components or users to perform authenticated cryptographic operations, while the later functionality enables the users to meet the AMI security requirements before generating a shared secret session key, which can be used in an ideal manner. We carry out experiments to validate the performance of our protocol, and the results show that our protocol offers better performance benefits compared to the existing related protocols and is suitable for the Energy Internet. We further demonstrate the usefulness of our ideal functionalities as a security reinforcement for a widely used KEP, namely the Elliptic Curve Diffie-Hellman.
引用
收藏
页码:534 / 546
页数:13
相关论文
共 39 条
  • [1] Efficient Anonymous Password-Authenticated Key Exchange Protocol to Read Isolated Smart Meters by Utilization of Extended Chebyshev Chaotic Maps
    Abbasinezhad-Mood, Dariush
    Nikooghadam, Morteza
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2018, 14 (11) : 4815 - 4828
  • [2] Abdalla M, 2001, LECT NOTES COMPUT SC, V2020, P143
  • [3] [Anonymous], 2006, 802154 IEEE MOT CORP
  • [4] [Anonymous], 2001, X9 63 PUBL KEY CRYPT
  • [5] [Anonymous], 2010, Communications requirements of smart grid technologies, P1
  • [6] AVISPA, Automated validation of internet security protocols and applications
  • [7] Baig Zubair A., 2013, Journal of Communications, V8, P473
  • [8] Basin D., 2005, Int. J. Inf. Secur., V4, P181, DOI [10.1007/s10207-004-0055-7, DOI 10.1007/S10207-004-0055-7]
  • [9] Black J, 2003, LECT NOTES COMPUT SC, V2595, P62
  • [10] Brown B., 2008, AMI SYSTEM SECURITY